Sciweavers

912 search results - page 87 / 183
» Anomaly
Sort
View
124
Voted
APNOMS
2006
Springer
15 years 6 months ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
158
Voted
CCS
2008
ACM
15 years 4 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
121
Voted
CSREASAM
2006
15 years 4 months ago
Firewall Rules Analysis
- In this paper, we propose a method to analyze the firewall policy or rule-set using Relational Algebra and Raining 2D-Box Model. It can discover all the anomalies in the firewall...
Thawatchai Chomsiri, Chotipat Pornavalai
100
Voted
IADIS
2004
15 years 4 months ago
A note on the distribution of packet arrivals in high-speed data networks
A simple explanation is given of an anomaly often detected in traffic measurement when packet timings are truncated to nearest whole numbers. The correct observed discrete distrib...
Vic Grout, Stuart Cunningham, Denise Oram, Rich He...
117
Voted
IJCAI
2001
15 years 4 months ago
Acquisition of Ontological Knowledge from Canonical Documents
This paper describes experiences with quasiautomated creation of a computational ontology for maritime information from a mixed collection of source material. Based on these exper...
Raphael M. Malyankar